Логотип exploitDog
product: "drupal"
Консоль
Логотип exploitDog

exploitDog

product: "drupal"
Drupal

Drupalсистема управления контентом с открытым исходным кодом. На Drupal работает более миллиона сайтов — от личных блогов до сайтов компаний, политических партий и государственных организаций.

Релизный цикл, информация об уязвимостях

Продукт: Drupal
Вендор: drupal

График релизов

11.110.411.210.5202420252026

Недавние уязвимости Drupal

Количество 1 975

ubuntu логотип

CVE-2022-25275

больше 2 лет назад

In some situations, the Image module does not correctly check access to image files not stored in the standard public files directory when generating derivative images using the image styles system. Access to a non-public file is checked only if it is stored in the "private" file system. However, some contributed modules provide additional file systems, or schemes, which may lead to this vulnerability. This vulnerability is mitigated by the fact that it only applies when the site sets (Drupal 9) $config['image.settings']['allow_insecure_derivatives'] or (Drupal 7) $conf['image_allow_insecure_derivatives'] to TRUE. The recommended and default setting is FALSE, and Drupal core does not provide a way to change that in the admin UI. Some sites may require configuration changes following this security release. Review the release notes for your Drupal version if you have issues accessing files or image styles after updating.

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-cfh2-7f6h-3m85

больше 2 лет назад

Access bypass in Drupal Core

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-52m2-vc4m-jj33

почти 3 года назад

Twig may load a template outside a configured directory when using the filesystem loader

CVSS3: 7.5
EPSS: Низкий
nvd логотип

CVE-2022-39261

почти 3 года назад

Twig is a template language for PHP. Versions 1.x prior to 1.44.7, 2.x prior to 2.15.3, and 3.x prior to 3.4.3 encounter an issue when the filesystem loader loads templates for which the name is a user input. It is possible to use the `source` or `include` statement to read arbitrary files from outside the templates' directory when using a namespace like `@somewhere/../some.file`. In such a case, validation is bypassed. Versions 1.44.7, 2.15.3, and 3.4.3 contain a fix for validation of such template names. There are no known workarounds aside from upgrading.

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2022-39261

почти 3 года назад

Twig is a template language for PHP. Versions 1.x prior to 1.44.7, 2.x ...

CVSS3: 7.5
EPSS: Низкий
ubuntu логотип

CVE-2022-39261

почти 3 года назад

Twig is a template language for PHP. Versions 1.x prior to 1.44.7, 2.x prior to 2.15.3, and 3.x prior to 3.4.3 encounter an issue when the filesystem loader loads templates for which the name is a user input. It is possible to use the `source` or `include` statement to read arbitrary files from outside the templates' directory when using a namespace like `@somewhere/../some.file`. In such a case, validation is bypassed. Versions 1.44.7, 2.15.3, and 3.4.3 contain a fix for validation of such template names. There are no known workarounds aside from upgrading.

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-6955-67hm-vjjq

около 3 лет назад

Drupal core arbitrary PHP code execution

CVSS3: 7.2
EPSS: Низкий
github логотип

GHSA-xh3v-6f9j-wxw3

около 3 лет назад

Drupal core Information Disclosure vulnerability

CVSS3: 7.5
EPSS: Низкий
fstec логотип

BDU:2022-04741

около 3 лет назад

Уязвимость CMS-системы Drupal, связанная с неверным управлением генерацией кода, позволяющая нарушителю выполнить произвольный код

CVSS3: 7.2
EPSS: Низкий
nvd логотип

CVE-2022-31043

около 3 лет назад

Guzzle is an open source PHP HTTP client. In affected versions `Authorization` headers on requests are sensitive information. On making a request using the `https` scheme to a server which responds with a redirect to a URI with the `http` scheme, we should not forward the `Authorization` header on. This is much the same as to how we don't forward on the header if the host changes. Prior to this fix, `https` to `http` downgrades did not result in the `Authorization` header being removed, only changes to the host. Affected Guzzle 7 users should upgrade to Guzzle 7.4.4 as soon as possible. Affected users using any earlier series of Guzzle should upgrade to Guzzle 6.5.7 or 7.4.4. Users unable to upgrade may consider an alternative approach which would be to use their own redirect middleware. Alternately users may simply disable redirects all together if redirects are not expected or required.

CVSS3: 7.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
1
ubuntu логотип
CVE-2022-25275

In some situations, the Image module does not correctly check access to image files not stored in the standard public files directory when generating derivative images using the image styles system. Access to a non-public file is checked only if it is stored in the "private" file system. However, some contributed modules provide additional file systems, or schemes, which may lead to this vulnerability. This vulnerability is mitigated by the fact that it only applies when the site sets (Drupal 9) $config['image.settings']['allow_insecure_derivatives'] or (Drupal 7) $conf['image_allow_insecure_derivatives'] to TRUE. The recommended and default setting is FALSE, and Drupal core does not provide a way to change that in the admin UI. Some sites may require configuration changes following this security release. Review the release notes for your Drupal version if you have issues accessing files or image styles after updating.

CVSS3: 7.5
0%
Низкий
больше 2 лет назад
github логотип
GHSA-cfh2-7f6h-3m85

Access bypass in Drupal Core

CVSS3: 6.5
0%
Низкий
больше 2 лет назад
github логотип
GHSA-52m2-vc4m-jj33

Twig may load a template outside a configured directory when using the filesystem loader

CVSS3: 7.5
1%
Низкий
почти 3 года назад
nvd логотип
CVE-2022-39261

Twig is a template language for PHP. Versions 1.x prior to 1.44.7, 2.x prior to 2.15.3, and 3.x prior to 3.4.3 encounter an issue when the filesystem loader loads templates for which the name is a user input. It is possible to use the `source` or `include` statement to read arbitrary files from outside the templates' directory when using a namespace like `@somewhere/../some.file`. In such a case, validation is bypassed. Versions 1.44.7, 2.15.3, and 3.4.3 contain a fix for validation of such template names. There are no known workarounds aside from upgrading.

CVSS3: 7.5
1%
Низкий
почти 3 года назад
debian логотип
CVE-2022-39261

Twig is a template language for PHP. Versions 1.x prior to 1.44.7, 2.x ...

CVSS3: 7.5
1%
Низкий
почти 3 года назад
ubuntu логотип
CVE-2022-39261

Twig is a template language for PHP. Versions 1.x prior to 1.44.7, 2.x prior to 2.15.3, and 3.x prior to 3.4.3 encounter an issue when the filesystem loader loads templates for which the name is a user input. It is possible to use the `source` or `include` statement to read arbitrary files from outside the templates' directory when using a namespace like `@somewhere/../some.file`. In such a case, validation is bypassed. Versions 1.44.7, 2.15.3, and 3.4.3 contain a fix for validation of such template names. There are no known workarounds aside from upgrading.

CVSS3: 7.5
1%
Низкий
почти 3 года назад
github логотип
GHSA-6955-67hm-vjjq

Drupal core arbitrary PHP code execution

CVSS3: 7.2
0%
Низкий
около 3 лет назад
github логотип
GHSA-xh3v-6f9j-wxw3

Drupal core Information Disclosure vulnerability

CVSS3: 7.5
0%
Низкий
около 3 лет назад
fstec логотип
BDU:2022-04741

Уязвимость CMS-системы Drupal, связанная с неверным управлением генерацией кода, позволяющая нарушителю выполнить произвольный код

CVSS3: 7.2
0%
Низкий
около 3 лет назад
nvd логотип
CVE-2022-31043

Guzzle is an open source PHP HTTP client. In affected versions `Authorization` headers on requests are sensitive information. On making a request using the `https` scheme to a server which responds with a redirect to a URI with the `http` scheme, we should not forward the `Authorization` header on. This is much the same as to how we don't forward on the header if the host changes. Prior to this fix, `https` to `http` downgrades did not result in the `Authorization` header being removed, only changes to the host. Affected Guzzle 7 users should upgrade to Guzzle 7.4.4 as soon as possible. Affected users using any earlier series of Guzzle should upgrade to Guzzle 6.5.7 or 7.4.4. Users unable to upgrade may consider an alternative approach which would be to use their own redirect middleware. Alternately users may simply disable redirects all together if redirects are not expected or required.

CVSS3: 7.5
0%
Низкий
около 3 лет назад

Уязвимостей на страницу


Поделиться